2017-07-13 20:15:15 +02:00
|
|
|
/****************************************************************************
|
2020-01-21 07:11:29 +01:00
|
|
|
* net/tcp/tcp_close.c
|
2017-07-13 20:15:15 +02:00
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2017-07-13 20:15:15 +02:00
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2017-07-13 20:15:15 +02:00
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2017-07-13 20:15:15 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
2020-01-21 07:11:29 +01:00
|
|
|
#ifdef CONFIG_NET_TCP
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
2020-01-22 16:29:26 +01:00
|
|
|
#include <nuttx/semaphore.h>
|
2017-07-13 20:15:15 +02:00
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/netdev.h>
|
|
|
|
#include <nuttx/net/tcp.h>
|
|
|
|
|
|
|
|
#include "netdev/netdev.h"
|
|
|
|
#include "devif/devif.h"
|
|
|
|
#include "tcp/tcp.h"
|
|
|
|
#include "socket/socket.h"
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
struct tcp_close_s
|
|
|
|
{
|
|
|
|
FAR struct devif_callback_s *cl_cb; /* Reference to TCP callback instance */
|
|
|
|
FAR struct socket *cl_psock; /* Reference to the TCP socket */
|
|
|
|
sem_t cl_sem; /* Signals disconnect completion */
|
|
|
|
int cl_result; /* The result of the close */
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2017-08-29 22:08:04 +02:00
|
|
|
* Name: tcp_close_eventhandler
|
2017-07-13 20:15:15 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
2017-08-29 22:08:04 +02:00
|
|
|
static uint16_t tcp_close_eventhandler(FAR struct net_driver_s *dev,
|
|
|
|
FAR void *pvconn, FAR void *pvpriv,
|
|
|
|
uint16_t flags)
|
2017-07-13 20:15:15 +02:00
|
|
|
{
|
|
|
|
FAR struct tcp_close_s *pstate = (FAR struct tcp_close_s *)pvpriv;
|
|
|
|
FAR struct tcp_conn_s *conn = (FAR struct tcp_conn_s *)pvconn;
|
|
|
|
|
2020-10-13 03:37:15 +02:00
|
|
|
DEBUGASSERT(pstate != NULL);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2020-10-13 03:37:15 +02:00
|
|
|
ninfo("flags: %04x\n", flags);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
/* TCP_DISCONN_EVENTS:
|
|
|
|
* TCP_CLOSE: The remote host has closed the connection
|
|
|
|
* TCP_ABORT: The remote host has aborted the connection
|
|
|
|
* TCP_TIMEDOUT: The remote did not respond, the connection timed out
|
|
|
|
* NETDEV_DOWN: The network device went down
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((flags & TCP_DISCONN_EVENTS) != 0)
|
|
|
|
{
|
2019-09-25 15:24:20 +02:00
|
|
|
/* The disconnection is complete. Wake up the waiting thread with an
|
2019-09-25 16:16:37 +02:00
|
|
|
* appropriate result. Success is returned in these cases:
|
2019-09-25 15:24:20 +02:00
|
|
|
*
|
2019-09-25 16:16:37 +02:00
|
|
|
* * TCP_CLOSE indicates normal successful closure. The TCP_CLOSE
|
|
|
|
* event is sent when the remote ACKs the outgoing FIN in the
|
|
|
|
* FIN_WAIT_1 state. That is the appropriate time for the
|
|
|
|
* application to close the socket.
|
2019-09-25 15:24:20 +02:00
|
|
|
*
|
2019-09-25 16:16:37 +02:00
|
|
|
* NOTE: The underlying connection, however, will persist, waiting
|
|
|
|
* for the FIN to be returned by the remote in the TIME_WAIT state.
|
|
|
|
*
|
|
|
|
* * TCP_ABORT is less likely but still means that the socket was
|
|
|
|
* closed, albeit abnormally due to a RST from the remote.
|
|
|
|
*
|
|
|
|
* * TCP_TIMEDOUT would be reported in this context if there is no
|
|
|
|
* ACK response to the FIN in the FIN_WAIT_2 state. The socket will
|
|
|
|
* again be closed abnormally.
|
|
|
|
*
|
|
|
|
* This is the only true error case.
|
2019-09-25 15:39:49 +02:00
|
|
|
*
|
2019-09-25 16:16:37 +02:00
|
|
|
* * NETDEV_DOWN would indicate that the network went down before the
|
|
|
|
* close completed. A non-standard ENODEV error will be returned
|
|
|
|
* in this case. The socket will be left in a limbo state if the
|
|
|
|
* network is taken down but should recover later when the
|
|
|
|
* NETWORK_DOWN event is processed further.
|
2019-09-25 15:24:20 +02:00
|
|
|
*/
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-09-25 15:24:20 +02:00
|
|
|
if ((flags & NETDEV_DOWN) != 0)
|
2017-07-13 20:15:15 +02:00
|
|
|
{
|
2019-09-25 15:24:20 +02:00
|
|
|
pstate->cl_result = -ENODEV;
|
|
|
|
}
|
2017-07-13 20:15:15 +02:00
|
|
|
else
|
|
|
|
{
|
2019-09-25 15:24:20 +02:00
|
|
|
pstate->cl_result = OK;
|
2017-07-13 20:15:15 +02:00
|
|
|
}
|
2019-09-25 15:24:20 +02:00
|
|
|
|
2019-10-25 19:31:42 +02:00
|
|
|
goto end_wait;
|
2017-07-13 20:15:15 +02:00
|
|
|
}
|
2019-12-24 12:57:34 +01:00
|
|
|
|
2019-11-24 17:41:11 +01:00
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2019-12-24 12:57:34 +01:00
|
|
|
/* Check if all outstanding bytes have been ACKed */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-12-24 12:57:34 +01:00
|
|
|
else if (conn->tx_unacked != 0 || !sq_empty(&conn->write_q))
|
|
|
|
{
|
|
|
|
/* No... we are still waiting for ACKs. Drop any received data, but
|
|
|
|
* do not yet report TCP_CLOSE in the response.
|
|
|
|
*/
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
flags &= ~TCP_NEWDATA;
|
|
|
|
}
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
#endif /* CONFIG_NET_TCP_WRITE_BUFFERS */
|
|
|
|
|
2019-12-24 12:57:34 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Drop data received in this state and make sure that TCP_CLOSE
|
|
|
|
* is set in the response
|
|
|
|
*/
|
|
|
|
|
|
|
|
dev->d_len = 0;
|
|
|
|
flags = (flags & ~TCP_NEWDATA) | TCP_CLOSE;
|
2017-07-13 20:15:15 +02:00
|
|
|
}
|
|
|
|
|
2019-09-28 20:57:26 +02:00
|
|
|
UNUSED(conn); /* May not be used */
|
2017-07-13 20:15:15 +02:00
|
|
|
return flags;
|
|
|
|
|
|
|
|
end_wait:
|
|
|
|
pstate->cl_cb->flags = 0;
|
|
|
|
pstate->cl_cb->priv = NULL;
|
|
|
|
pstate->cl_cb->event = NULL;
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&pstate->cl_sem);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
ninfo("Resuming\n");
|
2019-11-24 17:41:11 +01:00
|
|
|
return flags;
|
2017-07-13 20:15:15 +02:00
|
|
|
}
|
|
|
|
|
2019-12-24 12:57:34 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_close_txnotify
|
|
|
|
*
|
|
|
|
* Description:
|
2020-12-26 12:40:24 +01:00
|
|
|
* Notify the appropriate device driver that we have data ready to
|
|
|
|
* be sent (TCP)
|
2019-12-24 12:57:34 +01:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - Socket state structure
|
|
|
|
* conn - The TCP connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline void tcp_close_txnotify(FAR struct socket *psock,
|
|
|
|
FAR struct tcp_conn_s *conn)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
/* If both IPv4 and IPv6 support are enabled, then we will need to select
|
|
|
|
* the device driver using the appropriate IP domain.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (psock->s_domain == PF_INET)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
/* Notify the device driver that send data is available */
|
|
|
|
|
|
|
|
netdev_ipv4_txnotify(conn->u.ipv4.laddr, conn->u.ipv4.raddr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_IPv6
|
|
|
|
#ifdef CONFIG_NET_IPv4
|
|
|
|
else /* if (psock->s_domain == PF_INET6) */
|
|
|
|
#endif /* CONFIG_NET_IPv4 */
|
|
|
|
{
|
|
|
|
/* Notify the device driver that send data is available */
|
|
|
|
|
|
|
|
DEBUGASSERT(psock->s_domain == PF_INET6);
|
|
|
|
netdev_ipv6_txnotify(conn->u.ipv6.laddr, conn->u.ipv6.raddr);
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NET_IPv6 */
|
|
|
|
}
|
|
|
|
|
2017-07-13 20:15:15 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_close_disconnect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Break any current TCP connection
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2017-07-13 20:15:15 +02:00
|
|
|
* conn - TCP connection structure
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from normal user-level logic
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static inline int tcp_close_disconnect(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
struct tcp_close_s state;
|
|
|
|
FAR struct tcp_conn_s *conn;
|
|
|
|
int ret = OK;
|
|
|
|
|
|
|
|
/* Interrupts are disabled here to avoid race conditions */
|
|
|
|
|
|
|
|
net_lock();
|
2017-10-13 14:47:09 +02:00
|
|
|
|
2017-07-13 20:15:15 +02:00
|
|
|
conn = (FAR struct tcp_conn_s *)psock->s_conn;
|
2017-10-13 14:47:09 +02:00
|
|
|
DEBUGASSERT(conn != NULL);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 20:25:32 +02:00
|
|
|
#ifdef CONFIG_NET_SOLINGER
|
|
|
|
/* SO_LINGER
|
|
|
|
* Lingers on a close() if data is present. This option controls the
|
|
|
|
* action taken when unsent messages queue on a socket and close() is
|
|
|
|
* performed. If SO_LINGER is set, the system shall block the calling
|
|
|
|
* thread during close() until it can transmit the data or until the
|
|
|
|
* time expires. If SO_LINGER is not specified, and close() is issued,
|
|
|
|
* the system handles the call in a way that allows the calling thread
|
|
|
|
* to continue as quickly as possible. This option takes a linger
|
|
|
|
* structure, as defined in the <sys/socket.h> header, to specify the
|
|
|
|
* state of the option and linger interval.
|
|
|
|
*/
|
|
|
|
|
2020-01-04 11:37:46 +01:00
|
|
|
if (_SO_GETOPT(psock->s_options, SO_LINGER))
|
2019-07-01 20:25:32 +02:00
|
|
|
{
|
2020-01-04 11:37:46 +01:00
|
|
|
/* Wait until for the buffered TX data to be sent. */
|
2019-07-01 20:25:32 +02:00
|
|
|
|
2020-01-04 11:37:46 +01:00
|
|
|
ret = tcp_txdrain(psock, _SO_TIMEOUT(psock->s_linger));
|
|
|
|
if (ret < 0)
|
2019-07-03 02:02:23 +02:00
|
|
|
{
|
2020-01-04 11:37:46 +01:00
|
|
|
/* tcp_txdrain may fail, but that won't stop us from closing
|
|
|
|
* the socket.
|
2019-07-01 22:07:12 +02:00
|
|
|
*/
|
2019-07-01 20:25:32 +02:00
|
|
|
|
2020-01-04 11:37:46 +01:00
|
|
|
nerr("ERROR: tcp_txdrain() failed: %d\n", ret);
|
2019-07-01 20:25:32 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-10-13 14:47:09 +02:00
|
|
|
#ifdef CONFIG_NET_TCP_WRITE_BUFFERS
|
2017-07-13 20:15:15 +02:00
|
|
|
/* If we have a semi-permanent write buffer callback in place, then
|
2018-01-23 18:54:03 +01:00
|
|
|
* is needs to be be nullified.
|
2017-11-04 14:20:44 +01:00
|
|
|
*
|
|
|
|
* Commit f1ef2c6cdeb032eaa1833cc534a63b50c5058270:
|
|
|
|
* "When a socket is closed, it should make sure that any pending write
|
|
|
|
* data is sent before the FIN is sent. It already would wait for all
|
|
|
|
* sent data to be acked, however it would discard any pending write
|
|
|
|
* data that had not been sent at least once.
|
|
|
|
*
|
|
|
|
* "This change adds a check for pending write data in addition to unacked
|
|
|
|
* data. However, to be able to actually send any new data, the send
|
|
|
|
* callback must be left. The callback should be freed later when the
|
|
|
|
* socket is actually destroyed."
|
2018-01-23 18:54:03 +01:00
|
|
|
*
|
|
|
|
* REVISIT: Where and how exactly is s_sndcb ever freed? Is there a
|
|
|
|
* memory leak here?
|
2017-07-13 20:15:15 +02:00
|
|
|
*/
|
|
|
|
|
2017-11-04 14:16:22 +01:00
|
|
|
psock->s_sndcb = NULL;
|
2017-07-13 20:15:15 +02:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Check for the case where the host beat us and disconnected first */
|
|
|
|
|
|
|
|
if (conn->tcpstateflags == TCP_ESTABLISHED &&
|
|
|
|
(state.cl_cb = tcp_callback_alloc(conn)) != NULL)
|
|
|
|
{
|
|
|
|
/* Set up to receive TCP data event callbacks */
|
|
|
|
|
2019-12-24 12:57:34 +01:00
|
|
|
state.cl_cb->flags = (TCP_NEWDATA | TCP_POLL | TCP_DISCONN_EVENTS);
|
2017-08-29 22:08:04 +02:00
|
|
|
state.cl_cb->event = tcp_close_eventhandler;
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* A non-NULL value of the priv field means that lingering is
|
|
|
|
* enabled.
|
|
|
|
*/
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
state.cl_cb->priv = (FAR void *)&state;
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* Set up for the lingering wait */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
state.cl_psock = psock;
|
|
|
|
state.cl_result = -EBUSY;
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* This semaphore is used for signaling and, hence, should not have
|
|
|
|
* priority inheritance enabled.
|
|
|
|
*/
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
nxsem_init(&state.cl_sem, 0, 0);
|
2020-05-17 15:56:21 +02:00
|
|
|
nxsem_set_protocol(&state.cl_sem, SEM_PRIO_NONE);
|
2019-12-24 12:57:34 +01:00
|
|
|
|
|
|
|
/* Notify the device driver of the availability of TX data */
|
|
|
|
|
|
|
|
tcp_close_txnotify(psock, conn);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* Wait for the disconnect event */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2020-01-02 17:49:34 +01:00
|
|
|
net_lockedwait(&state.cl_sem);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* We are now disconnected */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
nxsem_destroy(&state.cl_sem);
|
|
|
|
tcp_callback_free(conn, state.cl_cb);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* Free the connection
|
|
|
|
* No more references on the connection
|
|
|
|
*/
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
conn->crefs = 0;
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* Get the result of the close */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
ret = state.cl_result;
|
|
|
|
}
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
/* Free network resources */
|
2017-07-13 20:15:15 +02:00
|
|
|
|
2019-07-01 15:25:47 +02:00
|
|
|
tcp_free(conn);
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
net_unlock();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-07-01 22:07:12 +02:00
|
|
|
/****************************************************************************
|
2020-01-21 07:11:29 +01:00
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: tcp_close
|
2019-07-01 22:07:12 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2020-01-21 07:11:29 +01:00
|
|
|
* Break any current TCP connection
|
2019-07-01 22:07:12 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
2020-01-21 07:11:29 +01:00
|
|
|
* psock - An instance of the internal socket structure.
|
2019-07-01 22:07:12 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* Called from normal user-level logic
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
int tcp_close(FAR struct socket *psock)
|
2019-07-01 22:07:12 +02:00
|
|
|
{
|
2020-01-21 07:11:29 +01:00
|
|
|
FAR struct tcp_conn_s *conn = psock->s_conn;
|
2020-01-16 18:20:09 +01:00
|
|
|
int ret;
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
/* Perform the disconnection now */
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
tcp_unlisten(conn); /* No longer accepting connections */
|
|
|
|
conn->crefs = 0; /* Discard our reference to the connection */
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
/* Break any current connections and close the socket */
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
ret = tcp_close_disconnect(psock);
|
2020-01-16 18:20:09 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2020-01-21 07:11:29 +01:00
|
|
|
/* This would normally occur only if there is a timeout
|
|
|
|
* from a lingering close.
|
2020-01-16 18:20:09 +01:00
|
|
|
*/
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
nerr("ERROR: tcp_close_disconnect failed: %d\n", ret);
|
|
|
|
return ret;
|
2019-07-01 22:07:12 +02:00
|
|
|
}
|
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
/* Stop the network monitor for all sockets */
|
2019-07-01 22:07:12 +02:00
|
|
|
|
2020-01-21 07:11:29 +01:00
|
|
|
tcp_stop_monitor(conn, TCP_CLOSE);
|
2019-07-01 22:07:12 +02:00
|
|
|
return OK;
|
|
|
|
}
|
2017-07-13 20:15:15 +02:00
|
|
|
|
|
|
|
#endif /* CONFIG_NET_TCP */
|